SEARCH RESULTS

YOU WERE LOOKING FOR :Global Communications Hegemony Challenged by the Internet

Essays 2071 - 2100

Internet CBT for OCD

disorder that is characterized by obsessions, i.e., thoughts, and/or compulsions, acts that must be done. The acts become rituals....

A Marketing Campaign to Encourage responsible Water Usage

a message that will be impact on the values and help to create a new generation of more water conscious citizens. The image of the...

Internet and the Impacts on Post-Secondary Education

in higher education (Lee 137). In Britain, the Internet age appears to be prevalent in urban settings, but there is also a clea...

Adolescent Cognitive Development, Internet Sites

not consider certain factors and pays little attention to individual differences (Papalia, Olds and Feldman). This site also gives...

21st Century Intellectual Property Laws

easier than ever to pirate and illegally distribute the same material. This paper provides an overview of intellectual property in...

Cognitive Development, Ages 2-6/Internet Sources

goal of the National Institute of Child Health and Human Development (NICHD) study Early Child Care and Youth Development was to p...

Three Stages in the Development of a Distance Learning Program

Cronin, 2005). The university offers lessons that are delivered in a range of mediums, including the use of video presentations, p...

Limiting Web Site Porn

Internet pornography accounts for $2.5 billion of the $57 billion pornography market. The Web has made porn easily accessible by i...

Investigating Cyber Bullying Using The Internet

This essay pertains to critiquing three Internet sources, a blog, a video and a podcast, as to their validity and applicability to...

Past Research Methods for Examining Internet Purchases

Research methodologies used in research to identify influences in internet purchasing are reviewed. The research is examined in t...

Computer History and Their Impact on Society

This research paper offers a comprehensive overview of the development of computers. Then, the writer discusses the impact that co...

Digitization and the Threat it Presents to Privacy

This paper laments the loss of privacy that has occurred with the increased digitization of data and, in particular, the advent of...

INTERNET PIRACY

Discusses the impact of Internet piracy on content providers. There are 6 sources listed in the bibliography of this 8-page paper....

Market Research Proposal for X-Soft

the children using instant, therefore the potential target markets, therefore the primary purchasers of parents who which control ...

Uses of the Internet

before, ways that can be seen as positive as well as negative. People can also use the computer to communicate with others...

MCBRIDE FINANCIAL SERVICES AND MARKETING

many types of research that McBride can rely on. Some suggestions include comment cards, focus groups, mail surveys and even telep...

ISSUES IN E-BUSINESS

lot easier to take a quote from someones online work and reproduce it in another piece of online work (Understanding Legal Issues ...

Primary Research Tools

given. This can also be used for statistical analysis as the answers can be coded after the event, however with fewer results ther...

Comparison of Internet and Traditional Shopping

become commonplace. This has increased convenience for the consumer, but has also resulted in many smaller grocery and specialist ...

ACTIVISM AND THE INTERNET

Experts have pointed out that in Iran, as in other developing countries, Internet usage is high amount the young affluent people w...

E-Health, Telemedicine and Impact

abreast of new developments in their field without information management tools. On any average day, there are "55 new clinical tr...

PROMOTIONAL PLAN FOR MAGIC JACK

cable companies that offer high-speed Internet are going to introduce their own VOIP products in the coming months and years. In t...

IS DOWNLOADING MUSIC STEALING?

problem with this argument, however, is that, as mentioned above, people lend out albums, tape off them and enjoy the music. Furth...

Dell Computers' Consumer Marketing

In seven pages this paper examines how Dell had had to shift its market from the business sector to computers and how the Internet...

Types of Conflicts and Models for Resolution

one of these categories: 1. Relationship conflicts may the be most common. They happen because we each have very strong feelings a...

Scholarly Research Online

understand or requires too many links to reach the desired information, the site has no value to that user even though it may have...

INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED

hindrance to productivity. Any employee who has trouble remembering an alpha-numeric password to get onto a system, then has to wa...

Article Summaries on Topics of Computer Viruses, CPUs and Speed, and the Internet

than normal, unexplainable file size changes, program-operating problems, difficulties in booting the system, and bizarre graphics...

Internet Explorer, Netscape

browser statistics compiler indicates that 76.1% of visitors employ Netscape Navigator and only 4.1% use Internet Explorer" (Wingf...

TURNING POINT DRUG REHAB AND SOLUTION DESIGN

How Use Will Help System Analysis and Design Process As mentioned in the previous paper, use cases are ideal for determini...